Search Results - (( java application customization algorithm ) OR ( user solution machine algorithm ))

Refine Results
  1. 1

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…The thesis proposed a solution that employs unique characteristics of machine learning and game-theoretic framework to enable a model-free and energy-efficient small cell network. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques by Muhammad Afnan, Mohammad Nasir

    Published 2022
    “…An effective machine learning approach created from a separate examination of many machine learning algorithms in WEKA should be applied for the correct identification of heart disease. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…However, it is observed that there are only a few machine learning solutions to detect phishing attacks on OSNs are being proposed and implemented. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Predicting open space parking vacancies using machine learning by Lee, Wei Jun

    Published 2023
    “…A custom object detector developed using the YOLOv4 algorithm was used to collect the data for training the machine learning model. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11
  12. 12
  13. 13

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman by Mohd Azman, Muhammad Qayyum

    Published 2024
    “…This research significantly contributes to the understanding of machine learning applications in the context of COVID-19 outbreak prediction, emphasizing the importance of algorithm and configuration selections for robust forecasting. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…While the UOCC AR mobile application allow users to view machining setup process through Augmented Reality guide therefore improving the average operating time for experienced users (42.46%) and non-experienced (28.36%). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…Usually, phishing websites are created resembling legitimate sources to deceive victims. To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Malware visualizer: A web apps malware family classification with machine learning by Mohd Zamri, Osman, Ahmad Firdaus, Zainal Abidin, Rahiwan Nazar, Romli

    Published 2021
    “…This project uses three classification algorithm which are Random Forest (RF), Support Vector Machine (SVM), and Convolutional Neural Network (CNN). …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Maldroid- attribute selection analysis for malware classification by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Mohd Zamri, Osman

    Published 2019
    “…Hence, the objective of this paper is to find the most effective and efficient attribute selection and classification algorithm in malware detection. Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
    Get full text
    Get full text
    Get full text
    Article